Mobile devices are everywhere, and they bring security concerns with them. Explore, in-depth, aspects of mobile security.
Mobile security threats are among the most serious threats to the enterprise. Explore mobile security threats, risk identification, and best practices for securely handling mobile devices. Cryptography provides the means to secure data at rest and in transit, but that's only part of the story for hardening mobile systems. Explore encryption and some practical use cases in the mobile enterprise.
Ethical Hacking is extremely important for enterprises. It helps find weaknesses and vulnerabilities of systems and networks before malicious hackers can. Explore ethical hacking.
Discover the requirements and objectives of the CEHv10 (312-50) exam and explore threats, the threat landscape, what motivates threat actors, and threat defense types. Watch the videos in this course and learn how to describe the questions associated with the CEHv10 exam, identify a vulnerability in IT security and recite various basic terms in IT security. You'll also observe how to provide an example of a network threat, determine a threat category, and outline a concept in threat management.
Explore the concepts of hackers and discover the common phases of hacking. In this course, you will examine what makes a good hacker and the different types of hackers like Script Kiddies, White Hats, and Black Hats. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify the purpose of each type of hacker, recall the type of hacker who simply executes an exploit, describe the difference between active and passive recon, identify tools used during each phase of the hacking process, and list the phases of the hacking process.